The present invention relates to integrated circuits, and in particular to security features applied to an integrated circuit that detects alteration of the integrated circuit.
If left unprotected, integrated circuits (ICs) are subject to alteration, by either deletion of design data or insertion of such data. Such alteration may be particularly unwanted when the IC is used in sensitive applications. Conventionally, a determination of whether an IC has been altered by deletion of design data can be done using built-in self-testing (BIST). However, detecting the addition of malicious circuitry poses a more challenging problem. Further, even when checking for deletions using BIST, each device in the IC must be checked. Thus, conventional methods, such as BIST, are not optimally effective in securing ICs against alteration.
An integrated circuit according to an exemplary embodiment of the present invention comprises a substrate; a circuit pattern formed over the substrate; and one or more fences formed around edges of the circuit pattern, each of the one or more fences having a determined electrical resistance.
In at least one embodiment, the circuit pattern comprises one or more layers, and at least one of the one or more fences is formed at each layer.
A method of securing an integrated circuit having a circuit pattern according to an exemplary embodiment of the present invention comprises the steps of: analyzing design data for the circuit pattern to determine edges of the circuit pattern; determining a route that surrounds the edges of the circuit pattern; and forming a fence along the route, wherein the fence has a determined electrical resistance.
In at least one embodiment, the step of analyzing comprises dividing the design data into partitions.
In at least one embodiment, the step of analyzing comprises determining which partitions are too close together to accommodate circuitry.
In at least one embodiment, the method further comprises a step of merging the partitions that are too close together to accommodate circuitry.
In at least one embodiment, the step of merging comprising polygon merging.
In at least one embodiment, the step of determining the route comprises applying a set of rules to ensure that the route provides at least a minimum clearance from the edges of the circuit pattern.
In at least one embodiment, the step of forming a fence comprises forming the fence in a polygon format.
In at least one embodiment, the step of forming a fence further comprises generating layout data for the fence.
In at least one embodiment, the layout data is generated using a set of rules.
In at least one embodiment, the step of forming a fence comprises maintaining a running sum of resistances for the fence.
A method of testing an integrated circuit comprising a substrate, a circuit pattern formed over the substrate, and one or more fences formed around edges of the circuit pattern, each of the one or more fences having a determined electrical resistance, according to an exemplary embodiment of the present invention comprises the steps of: measuring electrical resistance of the one or more fences; and comparing the measured electrical resistance to the determined electrical resistance.
In at least one embodiment, the circuit pattern comprises one or more layers, at least one of the one or more fences is formed at each layer, and the method further comprises: measuring inter-layer capacitance of the fences formed at each layer; and comparing the inter-layer capacitance to a determined inter-layer capacitance of the fences at each layer.
These and other features of this invention are described in, or are apparent from, the following detailed description of various exemplary embodiments of this invention.
Various exemplary embodiments of this invention will be described in detail, with reference to the following figures, wherein:
The present invention is directed to a system and method of securing an integrated circuit against alteration. It should be appreciated that the term “integrated circuit” as used herein is intended to cover any device that includes an electric circuit pattern, having semiconductor components or otherwise, including but not limited to display devices, such as liquid crystal displays and plasma displays, microcontrollers, memory devices, processors, sensors, power management circuits and amplifiers.
More particularly, various exemplary embodiments of the present invention are directed to systems and methods for securing an IC by forming a fence around edges of the various components of the IC pattern. The fence has known electrical characteristics, such as, for example, resistance and, in the case of multiple fences formed within individual layers of the IC, inter-layer capacitance. Thus, any alteration to the fence can be detected by detecting changes in the electrical characteristics of the fence. The fence may be generated using an algorithm that has a spatial based solution so as to divide design data from white space (i.e., space in which no circuit pattern is formed).
The circuit pattern analyzer 10 determines the edges of a circuit pattern. According to an embodiment of the invention, the circuit pattern analyzer 10 divides the design data into manageable partitions, and analyzes the data to determine which areas, known as small area sections, are too small to accommodate circuitry. This is shown in
The route calculator 20 uses the edges 112 of the circuit pattern 100 to determine a route that surrounds the circuit pattern 100. In this regard, the route calculator 20 may use minimum width and spacing rules to ensure that the route provides adequate clearance from the edges 112 of the circuit pattern 100.
The fence generator 30 calculates layout data for the fence which follows the route generated by the route calculator 20. The fence generator 30 preferably calculates the layout data in a polygon format using a set of rules as a guide. The rules may include minimum width, desired width, maximum width, minimum space, desired space and maximum space. As the fence layout data is generated, a running sum of the resistance may be maintained, so that the overall resistance of the completed fence may be determined. Once generation of the fence layout data is complete, as shown in
Preferably, a fence is built on all interconnect layers of the IC, including active layers, polysilicon layers and metal layers. Capacitances can be extracted from adjacent layers, and these capacitances and the resistances of the fences can be used to detect whether the fence has been altered. For example, according to an exemplary embodiment of the present invention, an IC including a fence may be tested by slight modifications of a conventional BIST (built-in self-test) algorithm to compensate for the fence. In particular, the BIST algorithm would need to be processed at least twice, once with the fence at ground and again with the fence at a high potential. If any unwanted circuitry crosses the fence and connects to the IC design data, the resulting short would be detectable though one of the BIST tests.
For large designs, it might be impractical to guard the entire circuit with one fence. The shorter the fence, the higher sensitivity is for detecting fence alterations. Thus, to increase sensitivity, multiple short fences may be used for a particular circuit pattern. If many fences are needed, a multiplexed input system may be required. However, this will not effect the BIST time, as it is only necessary to detect changes to electrical characteristics of the fence.
A capacitance test offers a safe guard against massive fence alterations. Someone could try to reverse engineer the fence, matching its resistance, but placing it in a different location. However, doing this on multiple layers, while also trying to match inter-level fence capacitance would prove to be nearly impossible.
While this invention has been described in conjunction with the exemplary embodiments outlined above, it is evident that many alternatives, modifications and variations will be apparent to those skilled in the art. Accordingly, the exemplary embodiments of the invention, as set forth above, are intended to be illustrative, not limiting. Various changes may be made without departing from the spirit and scope of the invention.
This application is a non-provisional application claiming priority to U.S. Provisional Patent Application Ser. No. 60/925,519 filed Apr. 20, 2007.
Number | Name | Date | Kind |
---|---|---|---|
5745076 | Turlington et al. | Apr 1998 | A |
5831324 | Bang | Nov 1998 | A |
5940031 | Turlington et al. | Aug 1999 | A |
6852619 | Okabe | Feb 2005 | B2 |
6982477 | Adan | Jan 2006 | B2 |
7310243 | Gilliland et al. | Dec 2007 | B2 |
7543262 | Wang et al. | Jun 2009 | B2 |
7875955 | Hopper et al. | Jan 2011 | B1 |
7936052 | Barth et al. | May 2011 | B2 |
20020011612 | Hieda | Jan 2002 | A1 |
20030227090 | Okabe | Dec 2003 | A1 |
20040195692 | Adan | Oct 2004 | A1 |
20050275061 | Ohguro | Dec 2005 | A1 |
20060011369 | Gilliland et al. | Jan 2006 | A1 |
20070130553 | Wang et al. | Jun 2007 | A1 |
20080258754 | Dillon et al. | Oct 2008 | A1 |
20090090995 | Yang et al. | Apr 2009 | A1 |
20100078776 | Barth et al. | Apr 2010 | A1 |
20100078777 | Barth et al. | Apr 2010 | A1 |
20100193904 | Watt et al. | Aug 2010 | A1 |
20100219513 | Zhang et al. | Sep 2010 | A1 |
Number | Date | Country | |
---|---|---|---|
20080258754 A1 | Oct 2008 | US |
Number | Date | Country | |
---|---|---|---|
60925519 | Apr 2007 | US |